584 research outputs found

    LEGO Brick as Pixel: Self, Community, and Digital Communication

    Get PDF
    Over the last three years the authors attended Brickworld Conventions for adult and teen fans of LEGO in Chicago. Through interviews, observations, and research they conclude that the LEGO brick is a medium replete with possibilities for creative construction and playful design beyond the expectations of its corporate producers. The history of the brick as a toy infuses play throughout its use, and the Internet provides a forum for adult and teen fans to communicate, critique, and discuss their creations. Online communication is perhaps the most interesting facet of LEGO play. It demonstrates a model of social change with LEGO builders of all ages in dialogue amongst a community of equals. This paper presents a case description of LEGO fans for future research on the burgeoning use of technology for play, communication, and the development of community

    Experience and Expression

    Get PDF
    Two artist-educators analyzed their creative process informed by John Dewey’s concepts regarding the act of expression. The essay interweaves a description of their performance piece with a discussion of conceptual processes, including intermediality and collaboration as crucial in art making, learning, and pedagogical efficacy. Both the creation of the piece and the written analysis were guided by concepts Dewey identified as compression, impulsion, and expression. The authors argue that experience and expression exemplify creative learning and are transferable to knowledge construction in all areas of inquiry. Throughout an aesthetic learning process, deep reflection plays an essential role with interpretation and application becoming the culminating stages. Amid crises in the early twenty-first century, the value for educational theory of an artistic process that leads toward social justice in a democracy is emphasized

    Admissibility of Co-Conspirator Statements in a Post-Crawford World

    Get PDF
    This Article takes the position that co-conspirator statements must be examined on a case-by-case basis to determine whether they are testimonial and thus subject to exclusion under the Confrontation Clause. Further, in light of the fact that the author of the majority opinions in Crawford and Davis was Justice Antonin Scalia, this Article examines whether interpreting the Sixth Amendment as a bar to the admission of certain coconspirator statements would violate an originalist interpretation of that provision. The conclusion reached is that it would not. In the current era of ever-narrowing rights for criminal defendants, reaffirming the law\u27s commitment to this one layer of protection whenever warranted seems to be the least we can do to promote justice

    Rapid Development of Clinical Trial Candidates Using Cancer Systems Pharmacology: a Lymphoma Case Study

    Get PDF
    poster abstractDue to intrinsic complex molecular interactions, the “one disease – one target – one drug” strategy for disease treatment is no longer the best option to treat complex diseases such as cancers. To assess drug pharmacological effects, we assume that “ideal” drugs for patients can treat or prevent the disease by modulating its gene expression profile to a similar level of those in healthy people. A drug that may not have been approved to treat a cancer yet, based on its gene expression target profile is the most successfully at modulating the gene expression to being of similar level to a healthy person is known as drug repurposing. The goal of this study was to develop an in silico framework which would determine which drug(s) could be repurposed to treat more complex disease of interest such as cancers. Using three subcategories of Non-Hodgkin’s Lymphoma (Burkitt’s, Mantle, Diffuse Large B-Cell) as case studies, manual curation was done to collect data on drug-protein interaction, drug similarity analysis based on structure and protein target, and curation; disease-protein interactions, and protein-protein interactions. A network will be created from the curated data known as a Pharmacology Effect Network (PEN). The Pharmacological Effect on Target (PET) algorithm will then be used to rank the curated drugs. This ranking will help determine which of the investigated drugs not currently used to treat one of the three subsets of Non-Hodgkin’s lymphoma could possibly be recommended to treat them. Although this project was primarily done using manual curation, the framework of each curated relationship used by each curator has been incorporated into a web interface. This webpage will allow for more automation of the curation process with little help from the curator and should improve the speed and accuracy of the curation process. Mentors: Jake Chen7, Xiaogang Wu7, Walter Jessen8 7IU Center for Systems Biology and Personalized Medicine, IUPUI; 8Informatics, Covance, Greenfiel

    Adversarial Examples in Constrained Domains

    Full text link
    Machine learning algorithms have been shown to be vulnerable to adversarial manipulation through systematic modification of inputs (e.g., adversarial examples) in domains such as image recognition. Under the default threat model, the adversary exploits the unconstrained nature of images; each feature (pixel) is fully under control of the adversary. However, it is not clear how these attacks translate to constrained domains that limit which and how features can be modified by the adversary (e.g., network intrusion detection). In this paper, we explore whether constrained domains are less vulnerable than unconstrained domains to adversarial example generation algorithms. We create an algorithm for generating adversarial sketches: targeted universal perturbation vectors which encode feature saliency within the envelope of domain constraints. To assess how these algorithms perform, we evaluate them in constrained (e.g., network intrusion detection) and unconstrained (e.g., image recognition) domains. The results demonstrate that our approaches generate misclassification rates in constrained domains that were comparable to those of unconstrained domains (greater than 95%). Our investigation shows that the narrow attack surface exposed by constrained domains is still sufficiently large to craft successful adversarial examples; and thus, constraints do not appear to make a domain robust. Indeed, with as little as five randomly selected features, one can still generate adversarial examples.Comment: 17 pages, 5 figure
    • …
    corecore